Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Artificial Intelligence
Data Analysis
Digital Marketing
Max MSP Programming Course: Structuring Interactive Software for Digital Arts
Algorithms, Part I
The Emergence of the Modern Middle East - Part I
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore advanced malware protocol simulations for distributed networks, enhancing threat detection and defense strategies through realistic Command & Control traffic replication without using actual malware.
Explore new methods for escaping privileged runc containers, focusing on cloud security vulnerabilities and innovative exploit techniques in container environments.
Explore on-premise protective DNS using RPZ for network security without cloud reliance. Learn motives, methods, and implementation from internet pioneer Dr. Paul Vixie.
Exploración profunda de vulnerabilidades en controladores Modicon PAC de Schneider, analizando protocolos de comunicación privados y mecanismos de protección por contraseña. Incluye demostraciones de ataques y recomendaciones defensivas.
Explore static binary instrumentation with IDA2Obj, a tool for dumping object files from executables. Learn implementation, challenges, and integration with fuzzing engines for efficient code coverage collection.
Innovative approach to offensive CI/CD pipelines for red and purple team operations, automating weaponization and evasion techniques using Infrastructure as Code and Kubernetes.
Practical insights into AI red teaming for facial recognition systems, exploring vulnerabilities, attack methods, and defense strategies in real-world environments.
Enhancing Ghidra: BinCraft's modernization efforts, improved decompilation, and integration of advanced techniques like GraalVM for a more powerful reverse engineering tool.
Exploring the future of RF combat: IoT in defense, cyber-EW convergence, jamming, counter-drone solutions, and RF-focused case studies for next-gen battlefield technology and strategy.
Exploración detallada de la API AppAttest de Apple, sus vulnerabilidades y limitaciones como solución anti-manipulación, con ejemplos de implementaciones débiles y escenarios de bypass.
Explore the evolving security landscape, examining offensive and defensive strategies, technological breakthroughs, and future trends in cybersecurity. Gain insights into the ongoing arms race between attackers and defenders.
Insightful discussion with cybersecurity experts Ero Carrera and Sergey Lozhkin on advanced threat analysis, reverse engineering, and the role of AI/ML in cybersecurity at HITB2021AMS.
Explore JARM fingerprinting evasion techniques and a JARM randomizer proxy for C2 channels. Learn about challenges, future improvements, and strategies to avoid blocklists in TLS-based fingerprinting.
Exploring advanced covert communication techniques for malware, including DNS tunneling, cloud services exploitation, and AWS GuardDuty evasion. Discusses mitigation strategies and common security pitfalls.
Explore 5G network interconnect security, focusing on roaming vulnerabilities, attack vectors, and protective measures. Learn about signaling firewalls and potential risks to user privacy.
Get personalized course recommendations, track subjects and courses with reminders, and more.